Wind River Glossary
Wind River Technical Glossary
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
A security association is a contract between two network peers, negotiated by IKE or set manually, that governs how the peers protect data passing between them. An SA applies to packets of a specific traffic type passing between specific ports on hosts at specific addresses. It determines the security protocol (AH or ESP), protocol mode, and protocol options to be used by IPsec for those packets. It is uniquely identified by a 3-tuple consisting of a Security Parameter Index (SPI), the destination address, and the protocol. An AH SA specifies the authentication key and the hash algorithm to be used. An ESP SA specifies the encryption key and the encryption algorithm to be used.
A security association bundle is a sequence of SAs by which traffic must be processed to satisfy a security policy.
Security Association Database
Socket Application Library
Stream Control Transmission Protocol
Software Development Kit
Sequential Color with Memory
A subset of an object file. One section may contain code, another section may contain initialized variables, another may contain strings, and so on. Default sections are target-dependent; additional sections may be defined by the user.
Commonly, the linker bundles together various input sections in object files into output sections in an executable. For example, it bundles input sections containing initialized data created from different source files into a single output section of initialized data (which it locates in physical memory) in the executable.
self-hosted development environment
The opposite of cross-development. The debugger and the application are running on the same machine.